[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://{security/2017/dsa-3776.wml}



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2017/dsa-3776.wml	2017-01-31 10:31:54.000000000 +0500
+++ russian/security/2017/dsa-3776.wml	2017-01-31 10:45:34.971363862 +0500
@@ -1,108 +1,109 @@
- -<define-tag description>security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities have been discovered in the chromium web browser.</p>
+<p>Ð? веб-бÑ?аÑ?зеÑ?е chromium бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей.</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5006";>CVE-2017-5006</a>
 
- -    <p>Mariusz Mlynski discovered a cross-site scripting issue.</p></li>
+    <p>Ð?аÑ?иÑ?Ñ? Ð?линÑ?кий обнаÑ?Ñ?жил межÑ?айÑ?овÑ?й Ñ?кÑ?ипÑ?инг.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5007";>CVE-2017-5007</a>
 
- -    <p>Mariusz Mlynski discovered another cross-site scripting issue.</p></li>
+    <p>Ð?аÑ?иÑ?Ñ? Ð?линÑ?кий обнаÑ?Ñ?жил еÑ?Ñ? один Ñ?лÑ?Ñ?ай межÑ?айÑ?ового Ñ?кÑ?ипÑ?инга.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5008";>CVE-2017-5008</a>
 
- -    <p>Mariusz Mlynski discovered a third cross-site scripting issue.</p></li>
+    <p>Ð?аÑ?иÑ?Ñ? Ð?линÑ?кий обнаÑ?Ñ?жил еÑ?Ñ? Ñ?Ñ?еÑ?ий Ñ?лÑ?Ñ?ай межÑ?айÑ?ового Ñ?кÑ?ипÑ?инга.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5009";>CVE-2017-5009</a>
 
- -    <p>Sean Stanek and Chip Bradford discovered an out-of-bounds memory
- -    issue in the webrtc library.</p></li>
+    <p>Шон СÑ?анек и Чип Ð?Ñ?Ñ?дÑ?оÑ?д обнаÑ?Ñ?жили пÑ?облемÑ? Ñ? доÑ?Ñ?Ñ?пом за пÑ?еделÑ? вÑ?деленного
+    бÑ?Ñ?еÑ?а памÑ?Ñ?и в библиоÑ?еке webrtc.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5010";>CVE-2017-5010</a>
 
- -    <p>Mariusz Mlynski discovered a fourth cross-site scripting issue.</p></li>
+    <p>Ð?аÑ?иÑ?Ñ? Ð?линÑ?кий обнаÑ?Ñ?жил еÑ?Ñ? Ñ?еÑ?вÑ?Ñ?Ñ?Ñ?й Ñ?лÑ?Ñ?ай межÑ?айÑ?ового Ñ?кÑ?ипÑ?инга.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5011";>CVE-2017-5011</a>
 
- -    <p>Khalil Zhani discovered a way to access unauthorized files in the
- -    developer tools.</p></li>
+    <p>Халил Ð?ани обнаÑ?Ñ?жил Ñ?поÑ?об полÑ?Ñ?ениÑ? доÑ?Ñ?Ñ?па к неавÑ?оÑ?изованнÑ?м Ñ?айлам в
+    инÑ?Ñ?Ñ?Ñ?менÑ?аÑ? Ñ?азÑ?абоÑ?Ñ?ика.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5012";>CVE-2017-5012</a>
 
- -    <p>Gergely Nagy discovered a heap overflow issue in the v8 javascript
- -    library.</p></li>
+    <p>Ð?еÑ?гей Ð?аги обнаÑ?Ñ?жил пеÑ?еполнение динамиÑ?еÑ?кой памÑ?Ñ?и в javascript-библиоÑ?еке
+    v8.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5013";>CVE-2017-5013</a>
 
- -    <p>Haosheng Wang discovered a URL spoofing issue.</p></li>
+    <p>ХаоÑ?Ñ?н Ð?ан обнаÑ?Ñ?жил возможноÑ?Ñ?Ñ? подделаÑ?Ñ? URL.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5014";>CVE-2017-5014</a>
 
- -    <p>sweetchip discovered a heap overflow issue in the skia library.</p></li>
+    <p>sweetchip обнаÑ?Ñ?жил пеÑ?еполнение динамиÑ?еÑ?кой памÑ?Ñ?и в библиоÑ?еке skia.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5015";>CVE-2017-5015</a>
 
- -    <p>Armin Razmdjou discovered a URL spoofing issue.</p></li>
+    <p>Ð?Ñ?мин РазмджÑ? обнаÑ?Ñ?жил возможноÑ?Ñ?Ñ? подделаÑ?Ñ? URL.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5016";>CVE-2017-5016</a>
 
- -    <p>Haosheng Wang discovered another URL spoofing issue.</p></li>
+    <p>ХаоÑ?Ñ?н Ð?ан обнаÑ?Ñ?жил еÑ?Ñ? однÑ? возможноÑ?Ñ?Ñ? подделаÑ?Ñ? URL.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5017";>CVE-2017-5017</a>
 
- -    <p>danberm discovered an uninitialized memory issue in support for
- -    webm video files.</p></li>
+    <p>danberm обнаÑ?Ñ?жил пÑ?облемÑ? Ñ? неиниÑ?иализиÑ?ованной памÑ?Ñ?Ñ?Ñ? в поддеÑ?жке
+    видеоÑ?айлов в Ñ?оÑ?маÑ?е webm.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5018";>CVE-2017-5018</a>
 
- -    <p>Rob Wu discovered a cross-site scripting issue.</p></li>
+    <p>Роб Ð?Ñ? обнаÑ?Ñ?жил межÑ?айÑ?овÑ?й Ñ?кÑ?ипÑ?инг.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5019";>CVE-2017-5019</a>
 
- -    <p>Wadih Matar discovered a use-after-free issue.</p></li>
+    <p>Ð?ади Ð?аÑ?аÑ? обнаÑ?Ñ?жил иÑ?полÑ?зование Ñ?казаÑ?елей поÑ?ле оÑ?вобождениÑ? памÑ?Ñ?и.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5020";>CVE-2017-5020</a>
 
- -    <p>Rob Wu discovered another cross-site scripting issue.</p></li>
+    <p>Роб Ð?Ñ? обнаÑ?Ñ?жил еÑ?Ñ? один межÑ?айÑ?овÑ?й Ñ?кÑ?ипÑ?инг.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5021";>CVE-2017-5021</a>
 
- -    <p>Rob Wu discovered a use-after-free issue in extensions.</p></li>
+    <p>Роб Ð?Ñ? обнаÑ?Ñ?жил иÑ?полÑ?зование Ñ?казаÑ?елей поÑ?ле оÑ?вобождениÑ? памÑ?Ñ?и в Ñ?аÑ?Ñ?иÑ?ениÑ?Ñ?.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5022";>CVE-2017-5022</a>
 
- -    <p>PKAV Team discovered a way to bypass the Content Security Policy.</p></li>
+    <p>ЧленÑ? командÑ? PKAV обнаÑ?Ñ?жили Ñ?поÑ?об обÑ?ода пÑ?авила безопаÑ?ноÑ?Ñ?и Ñ?одеÑ?жимого.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5023";>CVE-2017-5023</a>
 
- -    <p>UK's National Cyber Security Centre (NCSC) discovered a type
- -    confusion issue.</p></li>
+    <p>СоÑ?Ñ?Ñ?дники Ð?аÑ?ионалÑ?ного Ñ?енÑ?Ñ?а кибеÑ?безопаÑ?ноÑ?Ñ?Ñ? (NCSC) Ð?еликобÑ?иÑ?ании обнаÑ?Ñ?жили
+    пÑ?Ñ?аниÑ?Ñ? Ñ?ипов.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5024";>CVE-2017-5024</a>
 
- -    <p>Paul Mehta discovered a heap overflow issue in the ffmpeg library.</p></li>
+    <p>Ð?ол Ð?еÑ?а обнаÑ?Ñ?жил пеÑ?еполнение динамиÑ?еÑ?кой памÑ?Ñ?и в библиоÑ?еке ffmpeg.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5025";>CVE-2017-5025</a>
 
- -    <p>Paul Mehta discovered another heap overflow issue in the ffmpeg
- -    library.</p></li>
+    <p>Ð?ол Ð?еÑ?а обнаÑ?Ñ?жил еÑ?Ñ? одно пеÑ?еполнение динамиÑ?еÑ?кой памÑ?Ñ?и в библиоÑ?еке
+    ffmpeg.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5026";>CVE-2017-5026</a>
 
- -    <p>Ronni Skansing discovered a user interface spoofing issue.</p></li>
+    <p>Ронни СканÑ?инг обнаÑ?Ñ?жил возможноÑ?Ñ?Ñ? подделки полÑ?зоваÑ?елÑ?Ñ?кого инÑ?еÑ?Ñ?ейÑ?а.</p></li>
 
 </ul>
 
- -<p>For the stable distribution (jessie), these problems have been fixed in
- -version 56.0.2924.76-1~deb8u1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (jessie) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 56.0.2924.76-1~deb8u1.</p>
 
- -<p>For the testing (stretch) and unstable (sid) distributions, these
- -problems will be fixed soon.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом (stretch) и неÑ?Ñ?абилÑ?ном (sid) вÑ?пÑ?Ñ?каÑ? Ñ?Ñ?и
+пÑ?облемÑ? бÑ?дÑ?Ñ? иÑ?пÑ?авленÑ? позже.</p>
 
- -<p>We recommend that you upgrade your chromium-browser packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? chromium-browser.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=wv3m
-----END PGP SIGNATURE-----


Reply to: